Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates

被引:0
|
作者
Decat, Maarten [1 ]
Moeys, Jasper [1 ]
Lagaisse, Bert [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, IMinds DistriNet, B-3001 Leuven, Belgium
关键词
Access control; access control policies; attribute-based access control; reuse; modularity; policy templates;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is key to limiting the actions of users in an application and attribute-based policy languages such as XACML allow to express a wide range of access rules. As these policy languages become more widely used, policies grow both in size and complexity. Modularity and reuse are key to specifying and managing such policies effectively. Ideally, complex or domain-specific policy patterns are defined once and afterwards instantiated by security experts in their application-specific policies. However, current policy languages such as XACML provide only limited features for modularity and reuse. To address this issue, we introduce policy templates as part of a novel attribute-based policy language called STAPL. Policy templates are policies containing unbound variables that can be specified when instantiating the template in another policy later on. STAPL supports four types of policy templates with increasing complexity and expressiveness. This paper illustrates how these policy templates can be used to define reusable policy patterns and validates that policy templates are an effective means to simplify the specification of large and complex attribute-based policies.
引用
收藏
页码:196 / 210
页数:15
相关论文
共 50 条
  • [31] Utilizing Policy Machine for Attribute-Based Access Control in Permissioned Blockchain
    Lawal, Sherifdeen
    Krishnan, Ram
    2021 IEEE INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (IEEE COINS 2021), 2021, : 131 - 136
  • [32] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [33] Attribute-based signcryption with hybrid access policy
    Gang Yu
    Zhenfu Cao
    Peer-to-Peer Networking and Applications, 2017, 10 : 253 - 261
  • [34] Attribute-based signcryption with hybrid access policy
    Yu, Gang
    Cao, Zhenfu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 253 - 261
  • [35] Toward Attribute-Based Access Control Policy in Industrial Networked Systems
    Cheminod, Manuel
    Durante, Luca
    Valenza, Fulvio
    Valenzano, Adriano
    2018 14TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS (WFCS 2018), 2018,
  • [36] Mining Positive and Negative Attribute-Based Access Control Policy Rules
    Iyer, Padmavathi
    Masoumzadeh, Amirreza
    SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 161 - 172
  • [37] An Attribute-Based Access Control Policy Retrieval Method Based on Binary Sequence
    Pan, Ruijie
    Wang, Gaocai
    Wu, Man
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [38] An ontology-based approach to improve access policy administration of attribute-based access control
    Li J.
    Zhang B.
    International Journal of Information and Computer Security, 2019, 11 (4-5): : 391 - 412
  • [39] Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Yin, Hongjian
    Zhang, Leyou
    Cui, Yilei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2768 - 2780
  • [40] ATTRIBUTE-BASED ACCESS CONTROL POLICY GENERATION APPROACH FROM ACCESS LOGS BASED ON THE CATBOOST
    Quan, Shan
    Zhao, Yongdan
    Helil, Nurmamat
    COMPUTING AND INFORMATICS, 2023, 42 (03) : 615 - 650